Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (178)
  • Article (79)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 27 Next »

27%
Listing 6
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
 will allocate 4 cores 15 ### using 3 processors on 1 node. 16 #PBS -l nodes=1:ppn=3 17 18 ### Tell PBS the anticipated run-time for your job, where walltime=HH:MM:SS 19 #PBS -l walltime=0:10:00 20 21 ### Load
27%
US Government Shutdown Ties Up $139.2 Million in Grant Funding
07.02.2019
Home »  HPC  »  News  » 
 
to the tally, which is available at the ASBMB website, the 0 grants totaling $0.0 during the shutdown period between December 22, 2018 and January 25, 2019 contrasts with 465 grants totaling $139.2 Million
27%
John the Ripper
22.08.2011
Home »  Articles  » 
 
systems is John the Ripper (John). John is a free tool from Openwall. System administrators should use John to perform internal password audits. It’s a small (<1MB) and simple-to-use password
27%
Monitor Your Nodes with collectl
28.03.2012
Home »  HPC  »  Articles  » 
/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize ################################################################################ # Collectl: V3.6.1-4 HiRes: 1 Options: -p localhost-20120310-133840.raw.gz -P -f
27%
The top three SSH tricks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Fotoflash,Fotolia.com
-A INPUT -p tcp -s [IP address of allowed server] --dport 22 -j ACCEPT on the server to which you want to SSH. Trick 2: Copying Files Securely The SSH protocol also includes Secure Copy (SCP
27%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
today is Fortran 90, even though more current versions (Fortran 95, Fortran 2003, and even Fortran 2008) are available. I took the C code in the previous article (Listings 2C and 3C) and rewrote
27%
New features in the Bareos Bacula fork
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Maxim Kazmin, 123RF.com
are usually overwhelmed by configuration options, the Bareos project offers package repositories for popular Linux distributions and Windows [3]. For Windows, additional packages for the OPSI [4] software
27%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
DestinationSizeChange 41943106 (40.0 MB) Another view of the file statistics lists which file effected the change: # gunzip -c /mnt/backup/rdiff-backup-data/file_statistics.\ 2015-03-15T10\:44\:06+01\:00.data.gz | awk '$2
27%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
_hosts) on each SSH client that stores information about fingerprints and an SHA256 hash of the public key of trusted communication partners. SSH now checks this information for a match each time a connection
27%
Pen Testing with netcat
14.05.2013
Home »  Articles  » 
 
the net start command to get a list of services running (Figure 3): >net start Figure 3: Output from the net start command. Several services

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 27 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice